I had a chance to visit a number of industrial events this year and can see the evolution of cybersecurity in the industrial field. One of these was the 4th National Institute of Standards and Technology’s (NIST) Cybersecurity Framework Workshop (CFW).
Browsing Category: Uncategorized
A group of researchers, hackers, and other security enthusiast are pooling their money together and offering it as a bounty to the first person that can successfully crack the Touch ID fingerprint authentication mechanism on Apple’s recently released iPhone 5S.
If you haven’t heard, Apple unveiled two new iterations of the iPhone at one of the Cupertino company’s typically grandiose product events yesterday. As usual, there was plenty of hype to go around, but the biggest change as far as security is concerned is the addition of a fingerprint scanner on the high-end new iPhone 5S.
A new phishing campaign is disseminating malicious links with emails purporting to come from CNN saying that the United States has initiated military strikes against the embattled regime of Syrian President Bashar al Assad.
Recent versions of the mobile application for Yahoo’s popular fantasy football service are vulnerable to a session hijack attack.
One day after the New York Times Web site was offline for several hours due to what experts speculated was an attack, the site of the Washington Post was hacked, apparently by the Syrian Electronic Army. Officials at the Post said that the attack followed closely on the heels of the SEA hacking the Twitter account of one of its employees.
Scenes from this year’s hacking conference in Las Vegas, Nev. include a keynote by General Keith B. Alexander, Director of the National Security Agency and talks by researchers Karsten Nohl and Ralf-Phillip Weinmann.
Las Vegas – In the last Black Hat briefing of the day Wednesday, German security researcher Karsten Nohl of Security Research Labs demonstrated a SIM card attack that exploited sloppy encryption and gave the researcher root access to a type of SIM card built into billions of mobile devices.
A 213-foot luxury yacht veered off course while cruising in the Mediterranean Sea this summer after a radio navigation research team led by global positioning systems expert Todd Humphreys of the University of Texas Austin built a custom-made device capable of overriding the ship’s GPS receivers with spoofed signals.
Barnaby Jack always seemed to find a way to make the process of banging away on an application–or a pacemaker or an ATM–look like the most fun anyone has ever had. And he wanted all of his friends to join in the fun. Jack, a respected and much-admired security researcher at IOActive, died on July 25 in San Francisco, just a few days before Black Hat, the conference that played host to some of his more memorable demonstrations.